• We are available for your help 24/7
  • Email: info@isindexing.com, submission@isindexing.com


International Journal of Cyber-Security and Digital Forensics (IJCSDF)

Journal Papers (4) Details Call for Paper Manuscript submission Publication Ethics Contact Authors' Guide Line
1 Rationale and Design of the Access Specification Language RASP, Mark Evered
In this paper we describe the formal specification language RASP for expressing fine-grained access control constraints in information systems. The design of the language is motivated by a number of IS case studies which demonstrate the complexity of the access constraints which arise if minimal (need-to-know) access is to be strictly enforced. RASP supports modularity, parameterization, role acquisition, constraint expressions and a symmetrical approach to role transitions and attribute transitions. No existing access control specification language supports all of these complex, realistic requirements.
2 Application of New Classes of Mersenne Primes for Fast Modular Reduction for Large-Integer Multiplication, Suhas Sreehari, Huapeng Wu, and Majid Ahmadi
This paper attempts to speed-up the modular reduction as an independent step of modular multiplication, which is the central operation in public-key cryptosystems. Based on the properties of Mersenne and Quasi-Mersenne primes, we have described four distinct sets of moduli which are responsible for converting the single-precision multiplication prevalent in many of today's techniques into an addition operation and a few simple shift operations. We propose a novel revision to the Modified Barrett algorithm presented in [3]. With the backing of the special moduli sets, the proposed algorithm is shown to outperform (speed-wise) the Modified Barrett algorithm by 80% for operands of length 700 bits, the least speed-up being around 70% for smaller operands, in the range of around 100 bits.
3 Rationale and Design of the Access Specification Language RASP, Mark Evered
In this paper we describe the formal specification language RASP for expressing fine-grained access control constraints in information systems. The design of the language is motivated by a number of IS case studies which demonstrate the complexity of the access constraints which arise if minimal (need-to-know) access is to be strictly enforced. RASP supports modularity, parameterization, role acquisition, constraint expressions and a symmetrical approach to role transitions and attribute transitions. No existing access control specification language supports all of these complex, realistic requirements.
4 Secure Model for Virtualization Layer in Cloud Infrastructure, Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir and Azizol Abdullah
Cloud security is one of the buzz words in cloud computing. Since virtualization is the fundamental of the cloud computing, needs to study it more deeply to avoid attacks and system failure. In this research is focused on virtualization vulnerabilities. In addition it is attempted to propose a model to secure and proper mechanism to react reasonable against the detected attack by intrusion detection system. With the secured model (SVM), virtual machines will be resist more efficiency against the attacks in cloud computing.